4-13
Chapter 4. Connecting to the Internet
Wireless Network Setup Using the Wireless LAN Setup Program
The procedures to connect to an access point using a wireless LAN configuration pro-
gram are described. Since the wireless LAN configuration program is included in the
system software media
, the user has to install the program.
1. Insert the
system software media
into the CD drive and install the wireless LAN
configuration program (ACU: Atheros Client Utility).
Select
System Software Media > User Installation > Wireless LAN Driver
ReadMe
, click
ReadMe
and install according to the instructions.
2. Right-click the wireless LAN Setting program (
) icon in the Taskbar and click
Open Atheros Client Utility
.
Alternatively, click
Start > All Programs > IEEE 802.11 WIRELESS LAN > Atheros
Client Utility
.
3. In the Profile Management tab, click on
Scan
to search for available wireless net-
works.
4. In Network Name (SSID), select an AP name to connect and click on
Activate
.
If a network does not appear, click on
Refresh
.
5. Enter a profile name to be used for the connection, select a security setting for the
AP to be connected in the Security window.
6. Click
OK
and then click on
OK
again in the Profile Management window.
If the profile is created, the created profile is displayed in the list below the Profile
Management tab and the wireless connection is made using the corresponding
profile.
The network authentication, the encryption type, and password of a access point
are configured in the access point management program. For information on the
security information, check the security settings of the access point or ask your
wireless network administrator.
Refer to the following when defining the WEP Key Settings.
•Data Encryption (WEP)
: IEEE802.11 WEP(Wired Equivalent Privacy) has 2
security levels: a 64-bit key (represented as 40 bit occasionally) and a 128-bit
key.
When connecting to an Atheros AP (Access Point), you can set up and use a 152
bit key (32 characters for hexadecimal and 16 characters for ASCII).
•Key Index
: Select an encryption key index being used by the AP between 1
and 4.
•To Use Encryption Key
: Enter 5 (for 64-bit) or 13 (for 128 bit) alphanumeric
characters (0~9. a~z or A~Z).
N
N
N
N
o
o
o
o
tt
tt
e
e
e
e
Содержание R45
Страница 58: ...3 32 Manual ...
Страница 93: ...System Management This chapter provides information on efficient computer management Chapter 5 Chapter 5 ...
Страница 104: ...5 12 Manual ...
Страница 116: ...6 12 Manual ...
Страница 145: ...Appendix System specifications software types and safety instructions are provided here Appendix Appendix ...